SlideShare uma empresa Scribd logo
1 de 39
IT Security Awareness:
Information Security is
Everyone’s Business
A Guide to Information Technology Security at
Northern Virginia
Community College
Goals of IT Security
Awareness Training
 To assist faculty and staff in using safe,
secure computer practice to safeguard
College computing systems and data they
store or access.
 To answer any questions about information
security requirements and procedures
 To promote Computer Security Awareness
Information
Technology Security
Awareness
What Is IT Security
Awareness?
Information Technology Security Awareness
means understanding various information
technology threats that exist in one's
computing environment and taking reasonable
steps to guard against them.
Who Is Responsible for
IT Security?
Everyone who uses a computer needs to know
how to keep his or her computer and data
secure to ensure a safe working
environment.
NOTE: Security Awareness is one of the thirteen

security components required in the COV ITRM
Standard SEC2001-01.1.
Who Must Have Security
Awareness Training?
 All new employees who use information
technology or have access to areas where
information resources reside, must receive
formal training within 30 days
 Refresher training must be provided to all
personnel annually at a minimum
What Are User Personal
Responsibilities?
Report security violations
Develop “end-of-day” security procedures
Practice proper telephone and e-mail security
Clear physical area in office of sensitive data
when not in office
 Do not leave your portable unattended
 Lock your office, if possible




What Are the
Consequences for
Security Violations?

 Risk to security and integrity of personal or
confidential information
 Los of employee and public trust resulting in
embarrassment and bad publicity
 Costly reporting requirements in case of compromise
of sensitive information
 Internal disciplinary action(s) up to and including
termination of employment, possible penalties,
prosecution, & potential for sanctions/lawsuits
What Must Be Included in
the Security Awareness
Training Program?
 Provide both general and position
appropriate security awareness content
 Specify timeframes for receiving initial,
ongoing and refresher training
 Be documented on an auditable medium
 Be approved by the Information Systems
Security Officer
How Is Security
Awareness Training
Documented?
 Receipt of training must be documented in
employee’s personnel file with employee’s
acknowledgement of receipt and understanding
 All training must be documented and filed with
Information Systems Security Officer and
available for audit
How Can Training Be
Delivered?






New employee orientation
General sessions
Departmental sessions
Web delivery via Web Pages, PowerPoint or video
Tip of the month via email to distribution lists
How Can Training Be
Delivered?





Posters
Brochures
“Security Day”
Brown bag lunch sessions
Computer Security
How Do I Secure My
Computer?








Use a firewall
Use strong passwords
Use antivirus software
Install security patches
Share files correctly
Back up files regularly
Don’t store sensitive information on hard
drive
How Can I Prevent
Spyware on my
Computer?
 Avoid free tool bars for your browser since
they may come with spyware
 Regularly use spam cleaners to remove
spyware.
Using USB Drives
Safely
How Do I Use USB Flash
Drives Safely?
 Back up files on USB flash drive
 Do not store sensitive data, such as SSNs or
student grades, on USB flash drive
 If possible, use password to protect data on
USB flash drive
 Remember to remove drive from your
computer before walking away
Safe Email Practice
What Is Safe Email
Practice?

 Don’t open email attachments unless you
know what they are.
 Don’t open, forward or reply to spam or
suspicious emails; delete them.
 Be aware of sure signs of scam email.
• Not addressed to you by name
• Asks for personal or financial information
• Asks you for password
• Asks you to forward it to lots of other people
Safe Email Practice
 Don’t click on website addresses in emails
unless you know what you are opening.
 Use official VCCS student email to
communicate with students about grades or to
provide feedback on assignments.
 Report email security concerns to IT Help Desk.
How Do I Recognize
Phishing?
 Phishing is type of email or instant message
scam designed to steal your identity.
 Phishing is the act of attempting to
fraudulently acquire sensitive information,
such as usernames, passwords, and credit
card details, by masquerading as trustworthy
entity in electronic communication using
email or instant message.
How Can I Safeguard
Against Phishing?
 Don’t reply to email or pop-up messages that ask
for personal or financial information.
 Don’t click on links in email or instant message.
 Don’t cut and paste link from questionable
message into your Web browser.
 Use antivirus and firewalls and update them
regularly.
 Don’t email personal or financial information.
 If you are scammed, visit Federal Trade
Commission’s Identity Theft website –
www.consumer.gov/idtheft
Protecting Sensitive
Information
How Do I Protect Sensitive
Data?
 Protect sensitive information on lists and
reports with social security numbers (SSNs).
 Limit access to lists and reports with SSNs to
those who specifically need SSNs for official
college business.
 Never store SSNs or lists with SSNs on
laptops or home computers.
 Save and store sensitive information on server
managed by campus or college IT staff.
Protection of Sensitive
Data

 Never copy sensitive data to CDs, disks, or
portable storage devices.
 Do not sore lists with sensitive information on
the Web.
 Lock printed materials with sensitive data in
drawers or cabinets when you leave at night.
 When done with printed sensitive material,
shred them.
Protection of Sensitive
Data
 Remove sensitive materials from printer right
away.
 If problem with printer, turn off printer to remove
sensitive material from printer’s memory.
 Personally deliver sensitive materials to recipient
or distribute information electronically using
College’s email system.
 Arrange for shared electronic file that requires
user ID and password.
Password Security
Guidelines
What Are the Password
Security Guidelines?
 Passwords must be treated as sensitive and
confidential information.
 Never share your password with anyone for
any reason.
 Passwords should not be written down, stored
electronically, or published.
Password Security
Guidelines
 Be sure to change initial passwords, password
resets and default passwords first time you log in.
 Use different passwords for your different
accounts.
 Create passwords that are
• not common,
• avoid common keyboard sequences,
• contain personal information, such as pets & birthdays.
Top Ten List of
Good Computing
Practices
What Are the Steps to
Take to Ensure Safe
Computing?
 Use cryptic passwords that can’t be easily
guessed and protect your passwords.
 Secure your area, files and portable equipment
before leaving them unattended.
 Make sure your computer is protected with
anti-virus and all security patches and updates.
Steps to Ensure Safe
Computing

 Make backup copies of data you do not want to
lose and store the copies very securely.
 Don’t save sensitive information on portable
devises, such as laptops, memory sticks, PDAs
data phones, CDs/DVDs.
 Practice safe emailing.
 Be responsible when using the Internet.
Steps to Ensure Safe
Computing
 Don’t install unknown or suspicious programs
on your computer.
 Prevent illegal duplication of proprietary
software.
 Protect against sypware/adware.
How Should I Report
Security Incidents?
 Immediately report suspected security
incidents & breaches to your supervisor and
the IT Help Desk.
Resources
Resource Handout
 Use the handout found on the IT Security
Awareness Training website as easy
reference for steps to follow to ensure
information security.
College and Campus
Resources
 Contact the IT HelpDesk
ithelpdesk@nvcc.vccs.edu
703-426-4141
 Contact the Office of Instructional & Information
Technology Support Services
703-323-3278
 Contact your campus Information Technology
Manager (ITMs)









Campus IT Staff
Contacts
Dave Babel (AL) dbabel@nvcc.vccs.edu
703-845-6019
Bruce Ghofrany (AN) bghofrany@nvcc.edu
323-4259
Jeff Howlett (MEC) jhowlett@nvcc.vccs.edu
703-822-6666
Kevin Kelley (LO) kkelley@nvcc.edu
703-450-2569
Lynn Bowers (MA) lbowers@nvcc.vccs.edu
703-257-6652
Lynn Feist (WO) nvfeisl@nvcc.vccs.edu
703-878-5659
Peter Tharp (CS) ptharp@nvcc.vccs.edu
703-323-3705
Tom Pyron (ELI) jpyron@nvcc.edu
703-323-3800

Mais conteúdo relacionado

Mais procurados

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101mateenzero
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanAhmed Musaad
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness SnapComms
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awarenesshubbargf
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018jubke
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber Security Infotech
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptOoXair
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 

Mais procurados (20)

Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Information Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing SudanInformation Security Awareness, Petronas Marketing Sudan
Information Security Awareness, Petronas Marketing Sudan
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
New Hire Information Security Awareness
New Hire Information Security AwarenessNew Hire Information Security Awareness
New Hire Information Security Awareness
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Cyber security training
Cyber security trainingCyber security training
Cyber security training
 
It security and awareness training 5 10-2018
It security and awareness training 5 10-2018It security and awareness training 5 10-2018
It security and awareness training 5 10-2018
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)Cyber security awareness training by cyber security infotech(csi)
Cyber security awareness training by cyber security infotech(csi)
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
IT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.pptIT Security Awareness-v1.7.ppt
IT Security Awareness-v1.7.ppt
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 

Destaque

Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaAtlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Companydanielblander
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3Tanmay Shinde
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 pptvasanthimuniasamy
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Securitybelsis
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security PresentationWajahat Rajab
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave
 
It security training
It security trainingIt security training
It security traininggethumamaravi
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Security training module
Security training moduleSecurity training module
Security training modulepagare_c
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 

Destaque (20)

Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
How To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your CompanyHow To Promote Security Awareness In Your Company
How To Promote Security Awareness In Your Company
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3ISO 27001 - Information security user awareness training presentation - part 3
ISO 27001 - Information security user awareness training presentation - part 3
 
Information Security Lecture #1 ppt
Information Security Lecture #1 pptInformation Security Lecture #1 ppt
Information Security Lecture #1 ppt
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
It security training
It security trainingIt security training
It security training
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Security training module
Security training moduleSecurity training module
Security training module
 
Network security
Network securityNetwork security
Network security
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Iso 27001 awareness
Iso 27001 awarenessIso 27001 awareness
Iso 27001 awareness
 

Semelhante a IT Security Awarenesss by Northern Virginia Community College

Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006Ben Rothke
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.pptAnuraagAwasthi3
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Anwar CHFI, SSCP, ITIL
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnumARUN REDDY M
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public schoolDevku45
 
6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptxDevenderDahiya9
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 
Security Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracSecurity Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracMegan Bell
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudNordic Backup
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber SecurityThrottleNet, Inc
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffNicholas Davis
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agentsocinc
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businessesB2BPlanner Ltd.
 

Semelhante a IT Security Awarenesss by Northern Virginia Community College (20)

Rothke Sia 2006
Rothke   Sia 2006Rothke   Sia 2006
Rothke Sia 2006
 
Intro to Information Security.ppt
Intro to Information Security.pptIntro to Information Security.ppt
Intro to Information Security.ppt
 
Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies Cybersecurity Awareness E-book by Propelled Technologies
Cybersecurity Awareness E-book by Propelled Technologies
 
Cyber pledge infoMagnum
Cyber pledge infoMagnumCyber pledge infoMagnum
Cyber pledge infoMagnum
 
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A  ....Salwan public schoolDev Abhijet Gagan Chaitanya VII-A  ....Salwan public school
Dev Abhijet Gagan Chaitanya VII-A ....Salwan public school
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Module 5: Safety
Module 5: SafetyModule 5: Safety
Module 5: Safety
 
6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 
Security Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best PracSecurity Awareness 9 10 09 V4 Best Prac
Security Awareness 9 10 09 V4 Best Prac
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
How to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the CloudHow to Bulletproof Your Data Defenses Locally & In the Cloud
How to Bulletproof Your Data Defenses Locally & In the Cloud
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security10 Tips for Improving Small Business Cyber Security
10 Tips for Improving Small Business Cyber Security
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and StaffComputer Security Basics for UW-Madison Emeritus Faculty and Staff
Computer Security Basics for UW-Madison Emeritus Faculty and Staff
 
Pci compliance training agents
Pci compliance training  agentsPci compliance training  agents
Pci compliance training agents
 
Cyber security for small businesses
Cyber security for small businessesCyber security for small businesses
Cyber security for small businesses
 

Mais de Atlantic Training, LLC.

Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IAtlantic Training, LLC.
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAPAtlantic Training, LLC.
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUAtlantic Training, LLC.
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IAtlantic Training, LLC.
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsAtlantic Training, LLC.
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerAtlantic Training, LLC.
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityAtlantic Training, LLC.
 

Mais de Atlantic Training, LLC. (20)

Wellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSUWellness for Supervisors by SWOSU
Wellness for Supervisors by SWOSU
 
Workplace Wellness by PHA
Workplace Wellness by PHAWorkplace Wellness by PHA
Workplace Wellness by PHA
 
Stress Management Training by SG
Stress Management Training by  SGStress Management Training by  SG
Stress Management Training by SG
 
Stress Management Training by SW
Stress Management Training by SWStress Management Training by SW
Stress Management Training by SW
 
Stress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&IStress and Worker Safety by Pennsylvania L&I
Stress and Worker Safety by Pennsylvania L&I
 
Respectful Workplace by RDTC
Respectful Workplace by RDTCRespectful Workplace by RDTC
Respectful Workplace by RDTC
 
Workplace Harassment by CLGW
Workplace Harassment by CLGWWorkplace Harassment by CLGW
Workplace Harassment by CLGW
 
Workplace Harassment Prevention by UT EAP
Workplace Harassment Prevention by  UT EAPWorkplace Harassment Prevention by  UT EAP
Workplace Harassment Prevention by UT EAP
 
Welding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&IWelding Safety by Pennsylvania L&I
Welding Safety by Pennsylvania L&I
 
Slips Trips & Falls Training by Signal
Slips Trips & Falls Training by SignalSlips Trips & Falls Training by Signal
Slips Trips & Falls Training by Signal
 
Preventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSUPreventing Falls, Slips and Trips by MGSU
Preventing Falls, Slips and Trips by MGSU
 
Preventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&IPreventing Workplace Harassment by Pennsylvania L&I
Preventing Workplace Harassment by Pennsylvania L&I
 
Warehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP LogisticsWarehouses In Emergencies by WFP Logistics
Warehouses In Emergencies by WFP Logistics
 
Prevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMCPrevention of Sexual Harassment by USMC
Prevention of Sexual Harassment by USMC
 
Sexual Harassment by DEOMI
Sexual Harassment by DEOMISexual Harassment by DEOMI
Sexual Harassment by DEOMI
 
Sexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by ShumakerSexual Harassment in the Workplace Training by Shumaker
Sexual Harassment in the Workplace Training by Shumaker
 
Sexual Harassment Training by NAP
Sexual Harassment Training by NAPSexual Harassment Training by NAP
Sexual Harassment Training by NAP
 
Scaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&IScaffolds Training by Pennsylvania L&I
Scaffolds Training by Pennsylvania L&I
 
Supervision
SupervisionSupervision
Supervision
 
New Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State UniversityNew Employee Safety Orientation by Oregon State University
New Employee Safety Orientation by Oregon State University
 

Último

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607dollysharma2066
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCRalexsharmaa01
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCRashishs7044
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfrichard876048
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Americas Got Grants
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditNhtLNguyn9
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in PhilippinesDavidSamuel525586
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 

Último (20)

(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
(Best) ENJOY Call Girls in Faridabad Ex | 8377087607
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR8447779800, Low rate Call girls in Dwarka mor Delhi NCR
8447779800, Low rate Call girls in Dwarka mor Delhi NCR
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Innovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdfInnovation Conference 5th March 2024.pdf
Innovation Conference 5th March 2024.pdf
 
Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...Church Building Grants To Assist With New Construction, Additions, And Restor...
Church Building Grants To Assist With New Construction, Additions, And Restor...
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
Chapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal auditChapter 9 PPT 4th edition.pdf internal audit
Chapter 9 PPT 4th edition.pdf internal audit
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
8447779800, Low rate Call girls in Shivaji Enclave Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Entrepreneurship lessons in Philippines
Entrepreneurship lessons in  PhilippinesEntrepreneurship lessons in  Philippines
Entrepreneurship lessons in Philippines
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 

IT Security Awarenesss by Northern Virginia Community College

  • 1. IT Security Awareness: Information Security is Everyone’s Business A Guide to Information Technology Security at Northern Virginia Community College
  • 2. Goals of IT Security Awareness Training  To assist faculty and staff in using safe, secure computer practice to safeguard College computing systems and data they store or access.  To answer any questions about information security requirements and procedures  To promote Computer Security Awareness
  • 4. What Is IT Security Awareness? Information Technology Security Awareness means understanding various information technology threats that exist in one's computing environment and taking reasonable steps to guard against them.
  • 5. Who Is Responsible for IT Security? Everyone who uses a computer needs to know how to keep his or her computer and data secure to ensure a safe working environment. NOTE: Security Awareness is one of the thirteen security components required in the COV ITRM Standard SEC2001-01.1.
  • 6. Who Must Have Security Awareness Training?  All new employees who use information technology or have access to areas where information resources reside, must receive formal training within 30 days  Refresher training must be provided to all personnel annually at a minimum
  • 7. What Are User Personal Responsibilities? Report security violations Develop “end-of-day” security procedures Practice proper telephone and e-mail security Clear physical area in office of sensitive data when not in office  Do not leave your portable unattended  Lock your office, if possible    
  • 8. What Are the Consequences for Security Violations?  Risk to security and integrity of personal or confidential information  Los of employee and public trust resulting in embarrassment and bad publicity  Costly reporting requirements in case of compromise of sensitive information  Internal disciplinary action(s) up to and including termination of employment, possible penalties, prosecution, & potential for sanctions/lawsuits
  • 9. What Must Be Included in the Security Awareness Training Program?  Provide both general and position appropriate security awareness content  Specify timeframes for receiving initial, ongoing and refresher training  Be documented on an auditable medium  Be approved by the Information Systems Security Officer
  • 10. How Is Security Awareness Training Documented?  Receipt of training must be documented in employee’s personnel file with employee’s acknowledgement of receipt and understanding  All training must be documented and filed with Information Systems Security Officer and available for audit
  • 11. How Can Training Be Delivered?      New employee orientation General sessions Departmental sessions Web delivery via Web Pages, PowerPoint or video Tip of the month via email to distribution lists
  • 12. How Can Training Be Delivered?     Posters Brochures “Security Day” Brown bag lunch sessions
  • 14. How Do I Secure My Computer?        Use a firewall Use strong passwords Use antivirus software Install security patches Share files correctly Back up files regularly Don’t store sensitive information on hard drive
  • 15. How Can I Prevent Spyware on my Computer?  Avoid free tool bars for your browser since they may come with spyware  Regularly use spam cleaners to remove spyware.
  • 17. How Do I Use USB Flash Drives Safely?  Back up files on USB flash drive  Do not store sensitive data, such as SSNs or student grades, on USB flash drive  If possible, use password to protect data on USB flash drive  Remember to remove drive from your computer before walking away
  • 19. What Is Safe Email Practice?  Don’t open email attachments unless you know what they are.  Don’t open, forward or reply to spam or suspicious emails; delete them.  Be aware of sure signs of scam email. • Not addressed to you by name • Asks for personal or financial information • Asks you for password • Asks you to forward it to lots of other people
  • 20. Safe Email Practice  Don’t click on website addresses in emails unless you know what you are opening.  Use official VCCS student email to communicate with students about grades or to provide feedback on assignments.  Report email security concerns to IT Help Desk.
  • 21. How Do I Recognize Phishing?  Phishing is type of email or instant message scam designed to steal your identity.  Phishing is the act of attempting to fraudulently acquire sensitive information, such as usernames, passwords, and credit card details, by masquerading as trustworthy entity in electronic communication using email or instant message.
  • 22. How Can I Safeguard Against Phishing?  Don’t reply to email or pop-up messages that ask for personal or financial information.  Don’t click on links in email or instant message.  Don’t cut and paste link from questionable message into your Web browser.  Use antivirus and firewalls and update them regularly.  Don’t email personal or financial information.
  • 23.  If you are scammed, visit Federal Trade Commission’s Identity Theft website – www.consumer.gov/idtheft
  • 25. How Do I Protect Sensitive Data?  Protect sensitive information on lists and reports with social security numbers (SSNs).  Limit access to lists and reports with SSNs to those who specifically need SSNs for official college business.  Never store SSNs or lists with SSNs on laptops or home computers.  Save and store sensitive information on server managed by campus or college IT staff.
  • 26. Protection of Sensitive Data  Never copy sensitive data to CDs, disks, or portable storage devices.  Do not sore lists with sensitive information on the Web.  Lock printed materials with sensitive data in drawers or cabinets when you leave at night.  When done with printed sensitive material, shred them.
  • 27. Protection of Sensitive Data  Remove sensitive materials from printer right away.  If problem with printer, turn off printer to remove sensitive material from printer’s memory.  Personally deliver sensitive materials to recipient or distribute information electronically using College’s email system.  Arrange for shared electronic file that requires user ID and password.
  • 29. What Are the Password Security Guidelines?  Passwords must be treated as sensitive and confidential information.  Never share your password with anyone for any reason.  Passwords should not be written down, stored electronically, or published.
  • 30. Password Security Guidelines  Be sure to change initial passwords, password resets and default passwords first time you log in.  Use different passwords for your different accounts.  Create passwords that are • not common, • avoid common keyboard sequences, • contain personal information, such as pets & birthdays.
  • 31. Top Ten List of Good Computing Practices
  • 32. What Are the Steps to Take to Ensure Safe Computing?  Use cryptic passwords that can’t be easily guessed and protect your passwords.  Secure your area, files and portable equipment before leaving them unattended.  Make sure your computer is protected with anti-virus and all security patches and updates.
  • 33. Steps to Ensure Safe Computing  Make backup copies of data you do not want to lose and store the copies very securely.  Don’t save sensitive information on portable devises, such as laptops, memory sticks, PDAs data phones, CDs/DVDs.  Practice safe emailing.  Be responsible when using the Internet.
  • 34. Steps to Ensure Safe Computing  Don’t install unknown or suspicious programs on your computer.  Prevent illegal duplication of proprietary software.  Protect against sypware/adware.
  • 35. How Should I Report Security Incidents?  Immediately report suspected security incidents & breaches to your supervisor and the IT Help Desk.
  • 37. Resource Handout  Use the handout found on the IT Security Awareness Training website as easy reference for steps to follow to ensure information security.
  • 38. College and Campus Resources  Contact the IT HelpDesk ithelpdesk@nvcc.vccs.edu 703-426-4141  Contact the Office of Instructional & Information Technology Support Services 703-323-3278  Contact your campus Information Technology Manager (ITMs)
  • 39.         Campus IT Staff Contacts Dave Babel (AL) dbabel@nvcc.vccs.edu 703-845-6019 Bruce Ghofrany (AN) bghofrany@nvcc.edu 323-4259 Jeff Howlett (MEC) jhowlett@nvcc.vccs.edu 703-822-6666 Kevin Kelley (LO) kkelley@nvcc.edu 703-450-2569 Lynn Bowers (MA) lbowers@nvcc.vccs.edu 703-257-6652 Lynn Feist (WO) nvfeisl@nvcc.vccs.edu 703-878-5659 Peter Tharp (CS) ptharp@nvcc.vccs.edu 703-323-3705 Tom Pyron (ELI) jpyron@nvcc.edu 703-323-3800

Notas do Editor

  1. Elaborate on each